ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C58BCEBA60C1
|
Infrastructure Scan
ADDRESS: 0x7176e08596e9cea92d933424c3a8a93b5893885c
DEPLOYED: 2026-05-07 21:07:47
LAST_TX: 2026-05-08 02:40:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x999fc787). [MEM] Virtual memory mapped: 0x0000 -> 0x8ff6. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Fuzzing input data for 34 iterations. [TRACE] Debug: d4e0fa0315c66d45. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x73fec26825365512ce264bae3da209187137c765’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x78f931e58ef1617824f40a58d500b768e26eb1da 0xb3b6f503cfe347d1763458553bce5be16a7a06b7 0x46e058c1cfc96228a16160156b5b6f8c92eb7abe 0x6829b67da5e31809674cc19b961f7437d32592ee 0x1a08ca0bcfa3570dc6dcf0897721d3f3c2fc9ac3 0x6ff28a528d7817e26b3d1d94b8075e7a4cee62c4 0xbc4a5ba659c96e89ca42241c025a76ba4ef8a99f 0x96f09c4fbd1be53ea794720cb1c08da707a75415 0xf951f3cc55606980eb827014211b52af81750381 0xfcea2d915f5ea14ce1ea4acdef98dd16bb2b6495 0x4a27f505cedbeda4b7a6ae9a1d29d2561ce7bba7 0xdc1f311f6b283d1f4896409ee1cde79ce2ff2c65 0x18a92970a38765b70bfaf0d10e126787e9f6a105 0xc1769568b45467891eccbf106722cfde3bf85058 0x5076100bd04c06cfdfdfba5fe59f04b6e34a6146 0x2ea29ef91abaa05afd1071ec8987109ba00f28bf 0x90afe04bdc67982bbe1489359c084709d39c0d5c 0xec9964cbb451e36a865e1ef499614ab71b021776 0x13d3b27c7c100621cb3b714deab858ee06d41db1 0x69c9431dbb4f439cdfd4b913c185565b4c3998fa
